ISO 27001 Control A.8.15: Logging and Monitoring

Categories

Latest Post

Have Any Question?

Got a question? We’re here to help!

Facebook
Twitter
LinkedIn
Pinterest

In “peaceful” times, it’s easy to overlook, but when security incidents arise, you need to start by identifying what happened, where, and who caused the incident. This is why logs are essential, and why monitoring them is crucial. This is precisely what control A.8.15 in ISO 27001:2022 addresses.

ISO 27001 Requirements for Logging and Monitoring

  • Event Logging

  • Log Storage

  • Protection of Logs

  • Analysis of Logs

Why Are Logs Important?

Having a system without an event log is a significant mistake. It can even result in penalties for breaching regulations concerning personal data protection. Many countries require the registration of user identification accessing personal data. For regulations related to information security in your country, see this article about laws and regulations on information security and business continuity by country.

The Simple Idea

If an incident occurs, you need to determine:

  • What happened (time/date, details)

  • Who was involved

  • The origin and causes

For instance, authorities capture security camera recordings during a criminal act. Similarly, black boxes exist in airplanes, ships, and trains.

Prevent Fraud and Other Incidents

Logs are records about system access, incidents, user activities, etc. Reviewing logs regularly can help analyze trends or detect possible fraudulent activities before major incidents occur. For example, multiple failed attempts to access a critical system may indicate unauthorized access attempts. Firewall logs showing external connections can signal potential external attacks.

For more on handling security incidents, see this article about handling incidents according to ISO 27001 A.16.

The Role of Logs

Logs monitor the system, revealing what happens within information systems. They provide information about incident origins and help identify trends to avoid problems. Many applications offer logging functionality, some even active by default. This information is crucial in forensic analysis and can serve as evidence in legal proceedings.

ISO 27001 Requirements for Logging and Monitoring

Annex A of ISO 27001:2022 includes control A.8.15 Logging, addressing issues mentioned:

Event Logging

Register information about user access and actions (including administrators and operators), errors, events, etc., in information systems.

Log Storage

For multiple applications, centralize logs by configuring a syslog server (a standard for message logging operating over a network with a client-server structure).

Protection of Log Information

Logs must be protected from unauthorized removal or modification. An attacker gaining unauthorized system access may remove log information to erase evidence. Set rules permitting log modification only by authorized individuals and fortify system access control measures.

Log Analysis

Analyze logs regularly to ensure unusual behavior and errors are detected and investigated promptly.

Clock Synchronization (Control A.8.17)

Ensure all systems have synchronized time and date configurations. This synchronization simplifies traceability tests during incidents. Achieve automated synchronization with time servers (NTP servers, where “NTP” stands for Network Time Protocol).

Focus on the Most Sensitive Systems

Maintaining logs is crucial for monitoring systems and may be obligatory. However, logging everything can lead to capacity problems. Identify critical systems and limit logged information to user access, failures, errors, etc. Consider deleting outdated logs or storing them in backup systems. It’s vital to record logs but not necessary to store all logs indefinitely.

Conclusion

Logs are essential for monitoring systems, detecting issues, and ensuring compliance with regulations. By implementing ISO 27001 control A.8.15 effectively, you can enhance your organization’s security posture and respond efficiently to incidents.